logo

Operating System Software Security

   

Added on  2023-03-30

8 Pages1388 Words309 Views
 | 
 | 
 | 
Running head: OPERATING SYSTEM SOFTWARE SECURITY 1
Operating System Software Security
Name of the Student:
Name of the University:
Author Note:
Operating System Software Security_1

OPERATING SYSTEM SOFTWARE SECURITY
2
Abstract
This report detailing a defense in depth approach for securing data on both Windows and
Linux operating systems. It includes all standards and processes required to secure the
various operating systems that run various Enterprise Resource Planning software needed by
NetSuite ERP organization. The organization is focused on the activities of identification of
the vulnerabilities by using the hacking techniques and they are able to evaluate their security
measures through the process include at least one security control for each layer of defense.
The ERP software’s runs on both Windows and Linux operating system, hence the security of
the application running inside the computer system have effective impacts on the overall
security of the organization. Lack of security and improper control of an ERP software may
cause attack in the system software.
Operating System Software Security_2

OPERATING SYSTEM SOFTWARE SECURITY
3
Operating System Software Security
The Enterprise System provides a complete SCM (Supply Chain Management)
solution with manufacturing, financial, distribution, planning, reporting and inventory
management capabilities (Varma & Khan, 2014). This process can be more effectively
handled by NetSuite enterprise to integrating it into various software platforms for processing
various services. The ERP software standardizes, integrates and streamlines business
processes over various sectors includes financial management and planning, production
management, order management, supply chain management, warehouse fulfilment and
procurement. In this report we will discuss the defense in depth approach for securing several
Enterprise Resource Planning software in the organization (Boyson, 2014). After, we will
analyse one security control for each layer of defense. Lastly, we will discuss the possible
vulnerabilities identified by the organization and the solution provided by first defense line
for both the operating systems.
Discussion
Role of Operating System (OS) software
An OS (Operating System) provides an interface among computer hardware and the
computer user so that they can be able to execute and control various programs associated
with it. It performs basic tasks such as memory management, file management, process
management, input-output handling, controlling other peripheral devices such as printers and
disk drives. Most of the modern computer system uses a single computing hardware which
executes multiple applications simultaneously. The various applications running within a
time sharing and multi-tasking environment, concurrently uses the same resources from the
system such as memory, CPU, I/O devices and disk drives, which is controlled by the
Operating System Software Security_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Key Features and Services of Operating Systems - Examples
|7
|1373
|13

Cyberspace & Cybersecurity Foundations
|10
|1651
|104

Operating System: Services, Security Risks, and Evaluation
|8
|2176
|28

Computer Security Assignment Solved
|10
|2742
|144

Fundamentals of Operating System and Programming Task 2022
|5
|1166
|20

Implementation of Virtualization in Software
|2
|926
|92